IJISC
  • Indexed in

  • Latest News

    June 25, 2020
    Associate Professor dr. Pradeep Kumar SINGH from Jaypee University of Information Technology, India, become Deputy Editor-in-Chief of IJISC
    December 27, 2019
    Volume 8, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2019
    Volume 8, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel


    Author(s): BELSHAW, Scott H.

    Quick view | Full article | Citations | Views: 12


    Author(s) keywords: , ,


    Reference keywords: ,


    Abstract:

    Responses in investigations of drug and sex traffic related crimes often originate in the Dark Web. Internet and cybercrimes are increasingly becoming reliant on criminal justice practitioners to help solve them. However, while the demand for criminal justice participation in cyber investigations increases daily, most law enforcement agencies or state law enforcement accrediting bodies are lagging in their educational and training opportunities for new police officers entering the law enforcement fields. This article discusses the need incorporate education courses covering the Dark and Deep Web in the law enforcement curriculum. A review of existing cyber-criminal justice programs in Texas (N=28) and nationally suggests that most colleges, with a cyber program, have yet to develop courses/programs in understanding and investigating the dark web on the internet. The federal government and a few companies have limited training on the Dark Web for law enforcement officers. The Dark Web serves as the new “Criminal Neighborhood” for illegal activity and needs to be better understood so it can be investigated. This research outlines the need for police officers and police investigators to learn the geographies of the Dark Web.



    References:

    [1]. Belshaw, S, (In Press) Next Generation of Evidence Collecting: The Need for Digital Forensics in Criminal Justice Education. Journal of Cyber Security Education, Research and Practice.

    [2]. Cheung, R.S., Cohen, J.P., Lo, H.Z., and Elia, F. (2011). Challenge based learning in cybersecurity education. Paper presented at the Proceedings of the 2011 International Conference on Security & Management.

    [3]. Conklin, A. (2006). Cyber defense competitions and information security education: An active learning solution for a capstone course. Paper presented at the Proceedings of the 39th Hawaii International Conference on System Science, Hawaii.

    [4]. Cybersecurity Education & Career Development. (n.d.). In Official Website of the Department of Homeland Security. Retrieved March 2, 2017. https://www.dhs.gov/topic/cybersecurity-education-career-development

    [5]. Federal Law Enforcement Training Canter (2019). Web site retrieved on April 24, 2019 at https://www.fletc.gov/training-program/internet-investigations-training-program

    [6]. Finklea, Kristin (2017). Dark Web. Congressional Research Service. 1 – 16. https://fas.org/sgp/crs/misc/R44101.pdf

    [7]. Ghappour, A. (2017). Searching places unknown: Law enforcement jurisdiction on the dark web. Stanford Law Review, 69, 1075 – 1136.

    [8]. Guccione, D. (2019), What is the dark web? How to access it and what you'll find. THE STATE OF CYBERSECURITY. Website retrieved on April 3, 2019 at https://www.csoonline.com/article/3249765/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html

    [9]. Hentea, M., Dhillon, H, & Dhillon, M. (2006). Towards changes in information security education. Journal of Information Technology Education, 5, 221-233.

    [10]. Hoffman, L.J., Rosenberg, T., Dodge, R., & Ragsdale, D. (2005). Exploring a national cybersecurity exercise for universities. IEEE Security & Privacy, 3(5), 27-33.

    [11]. Jensen. B.K., Cline, M., & Guynes, C.S. (2006). Teaching the undergraduate CS information security course. The SIGCSE Bulletin, 38(2), 61-63.

    [12]. Katz, F.H. (2010). Curriculum and pedagogical effects of the creation of a minor in cyber security. In 2010 Information Security Curriculum Development Conference, (pp. 49-51). ACM.

    [13]. Kehoe, S. (2019). The digital alleyway: Why the dark web cannot be ignored. https://www.policechiefmagazine.org/the-digital-alleyway/?ref=f68a16320be6cfe1b9a7ffc8f553cdd6

    [14]. Kelling, G. & Wilson, J. (March 1982). Broken windows: The police and neighbourhood safety. https://www.theatlantic.com/magazine/archive/1982/03/broken-windows/304465/

    [15]. Li, J., Zhao, Y., & Shi, L. (2009). Interactive teaching methods in information security course. Paper presented at Scalable Computing and Communications; Eighth International Conference on Embedded Computing, 3009. SCALCOM-EMBEDDEDCOM’09. International Conference.

    [16]. Logan, P. Y. (2002). Crafting an undergraduate information security emphasis within information technology. Journal of Information Systems Education, 13(3), 177.

    [17]. Nodeland, B., Belshaw, S., & Saber M. (2018). Teaching Cyber Security to Criminal Justice Majors. Journal of Criminal Justice Education. https://doi.org/10.1080/10511253.2018.1439513

    [18]. O'Leary, M. (2006). A laboratory based capstone course in computer security for undergraduates. In ACM SIGCSE Bulletin (Vol. 38, No. 1, pp. 2-6). ACM.

    [19]. Online Cybersecurity Bachelor's Degree. (n.d.). In U.S. News and World Report. Retrieved March 2, 2017. https://www.usnews.com/education/online-education/cybersecuritybachelors degree#coursework

    [20]. Reuters. "Target Settles 2013 Hacked Customer Data Breach For $18.5 Million." NBCNews, NBC, 24 May 2017, https://www.nbcnews.com/business/business-news/target-settles- 2013-hacked-customer-data-breach-18-5-million-n764031. Accessed 2 Jan. 2018.

    [21]. Rowe, D. C., Lunt, B. M., & Ekstrom, J. J. (2011). The role of cyber-security in information technology education. Paper presented at Proceedings of the 2011 conference on Information technology education. A cybersecurity basics course. ACM SIGCSE Bulletin, 36(4), 108-111.

    [22]. Smith, C. F., & Choo, T. (2016). Revisiting security administration in the classroom: A decade later. Security Journal, 29(2), 198-212.



    Additional Information

    Article Title: Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel
    Author(s): BELSHAW, Scott H.
    Date of Publication: 2019-12-27
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2019.02.03
    Issue: Volume 8, Issue 2, Year 2019
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 27-38 (12 pages)



    Copyright ©2012-2020
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.